Digital Magazine

Spear phishing and the modern cyber attack

Mike Atwood
Expert Contributors, IT Outsourcing Strategies - Atwood and Associates
Tony Ball
Senior Vice President, identity and Access Management (IAM) - HID Global
Stephen E. Arnold
Managing Partner - ArnoldIT.com
Martin Kuppinger
Founder and Senior Partner - Kuppinger Cole
Paul Burns
President and Founder - Neovise
Managing Editor: Pinar Gencturk
Editor: David Tran
Published the 28th of August 2011 by IMI Publishing

Security was hard to ignore as the main theme for this issue of ETM following the stream of news reports about the online attacks targeted at Google, Sony, Lockheed Martin and RSA – all of which are believed to be acts of Spear Phishing.

A recent report by Cisco, E-mail Attacks: This Time It's Personal, revealed a threefold increase in Spear Phishing attacks. Significantly, the report also stated that cyber-criminals were concentrating on low volume, though extremely refined, personalized or Spear Phishing attacks.

A recent report by Cisco, E-mail Attacks: This Time It's Personal, revealed a threefold increase in Spear Phishing attacks. Significantly, the report also stated that cyber-criminals were concentrating on low volume, though extremely refined, personalized or Spear Phishing attacks..

Cloud computing, another critical area of IT, remains in the spotlight. Zenoss reveals how to get deep analytics inside the cloud [page 30], RunMyProcess uncovers a unique cloud offering [page 38], Ipswitch discusses private cloud migration [page 52], and CenterBeam focuses on cloud security [page 54].

Also in this edition we feature trends in eco-friendly IT [page 19], the evolution of IT [page 46], email management [page 58] and communication solutions [page 72]. There is an engaging panel discussion on e-discovery by the leading thought leaders from Clearwell Systems, Nuix and AccessData led by Stephen E. Arnold [page 75].

And as usual, no ETM issue is complete without insightful expert articles. This quarter we’re especially pleased to present a special series by Mike Atwood on Outsourcing and Offshoring [page 10]. Tony Ball, the global senior vice president of identity and access management at HID, lists his top security tips, Google search is scrutinised by Stephen E. Arnold [page 34], Martin Kuppinger analyses business, and IT and Neovise president, Paul Burns, explains how to protect applications against failures in public clouds.

A wide range of topical podcasts are also available at www.globaletm.com
Thanks for reading, and don’t forget that I’m always keen to hear from industry
professionals, so please contribute your thoughts to our future issues: pgencturk@imipublishing.com